Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 17, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: KTA080 (CLOP) Update CL0P has recently published files from victim organizations that were last revealed from the E-H listing around February 24, 2025. Some victim organizations were removed from the E-H listing as well as the H-W listing, likely due to negotiations with the threat actor group to refrain from sensitive data to be published. Additional victim companies have also been published outside of the E-H listing.

API Honeypot Results: How Fast Do Hackers Strike? #CyberThreats #InstantDefense #HackerSpeed

New APIs are attacked in just 29 seconds, according to Wallarm’s API honeypot test. Batch requests can extract 10M records in under 10 seconds, making real-time protection essential. Learn how to secure APIs before attackers strike.

What is Turbo Threat Hunting?

Rapid, reliable has never been so easy. Keep your business moving forward at lightning speed with Turbo Threat Hunting. With the ability to proactively scan 75,000 backups in less than 60 seconds, you can recover and get back up to speed in record time. Time is money, especially when it comes to recovering and getting your business back up and running!

Security is NOT a Tech Problem: It's BUSINESS | CIO Reveals Board-Level Truth

Aysha Khan, CIO & CISO at Treasure Data, drops a truth bomb: "Security isn't a tech problem—it's a BUSINESS problem." In this eye-opening clip from, Aysha explains why cybersecurity deserves a seat at the board table and how empowering your CISO creates true organizational resilience. Listen to the full episode to discover why your security strategy might be fundamentally flawed!

Falcon for IT Visibility + Response: Demo Drill Down

In today's rapidly evolving IT landscape, organizations need comprehensive visibility and immediate response capabilities to maintain operational resilience and security compliance. CrowdStrike's AI-native Falcon for IT empowers teams with real-time detection, automated remediation, and enterprise-wide control through a unified platform—transforming how organizations identify, respond to, and resolve critical IT challenges at scale.

Silk Typhoon is Targeting MSPs - The 443 Podcast - Episode 322

This week on the podcast, we discuss a recent update from Microsoft's Threat Intelligence Center describing the latest tactics from Silk Typhoon, a Chinese nation state threat actor focusing in espionage. Before that, we cover the recent 0day vulnerabilities in VMware ESXi, Workstation and Fusion. We also analyze a report by S-RM on an Akira ransomware attack that leveraged IoT devices to hide from EDR tools.